The most recent content from our members.
Destiny Bertucci and Eric Hodeen discuss SolarWinds Network Configuration Manager (NCM) and the benefits of automated compliance. //html5-player.libsyn.com/embed/episode/id/10318727/height/90/theme/custom/thumbnail/no/direction/backward/render-playlist/no/custom-color/f99d1c/ Related Links * SolarWinds Network…
Compliance policies similar to NCM would be great. Something that supports STIGs, PCI, etc. etc.
Is there an ETA for NPM to add HMAC/SHA-2 support for SNMPv3 strings, due to the IETFs announcement that previous RFCs have been superseded? It has been long announced that SHA1, considered more secure than MD5, was proven highly vulnerable to exploit and other uses of SHA1 were being dropped. The IETF has finally reacted…
By Omar Rafik, SolarWinds Senior Manager, Federal Sales Engineering Here’s an interesting blog that reviews the fundamental steps every federal IT pro should take to create a strong security foundation. I agree with the author that an overarching plan that encompasses multiple layers of security can serve as the most…
The first three blogs in this series were all about building a blueprint for a well-designed environment. In this article, we’ll review more practical considerations to influence the overall architecture and design of the ecosystem, which in turn require specific features and methodologies as dictated by the required data…
By Paul Parker, SolarWinds Federal & National Government Chief Technologist Security is always an important topic with our government customers. Here's an applicable article from my colleague, Joe Kim, in which he offers some tips on compliance. Ensuring that an agency complies with all of the various standards can be a…
Hi, Are any NIST templates for FIM available? I did some searching and was unable to find any on Thwack or the net. If none are available, does LEM plan to have it on an upcoming patch or release? If not, is it possible to set it up to be compliant? If a guide is available please point me to the right direction. Thank you,…
From the dawn of computers and networks, log management has been an integral part of managing and monitoring IT processes. Today, managing log messages is instrumental to troubleshooting network issues and detecting security breaches. Log management involves collecting, analyzing, transmitting, storing, archiving, and…
After the network perimeter is locked down, servers are patched, and password policies enforced, end-users themselves are the first line of defense in IT security. They are often the target for a variety of attack vectors making them the first step of triage when a security incident is suspected. Security awareness…
It looks like you're new here. Sign in or register to get started.